Ex parte BENIGNUS et al. - Page 8




                 Appeal No. 1999-0246                                                                                                                   
                 Application 08/641,629                                                                                                                 

                 his position on this matter, relying now on Smitt and Heptig                                                                           
                 for the electronic key and physical key, respectively.                                           2                                     
                          Heptig discloses security apparatus including an                                                                              
                 electronic key 14 and a jack 16 for controlling access to the                                                                          
                 data and programs in a personal computer.  The key 14 contains                                                                         
                 coding identifying a unique user (col. 5, ll. 33-36).  One or                                                                          
                 more of the keys 14 are encoded as a "system master" or                                                                                
                 administrator level key, and the remaining keys are encoded as                                                                         
                 user level keys (col. 5, ll. 38-40).  Figures 13a-f are                                                                                
                 display menus                                                                                                                          
                 representing the administrative functions that can be                                                                                  
                 performed                                                                                                                              
                 when a valid  administrative key is detected as present in the                                                                         
                 jack (col. 16, ll. 13-15).  Specifically, Figure 13a is the                                                                            
                 FIRMLOC Main Utility Menu.  Figure 13b is the User/Key Utility                                                                         
                 Menu, which includes Show Users, Add User to System, Delete                                                                            
                 User from System, and Read Key.  Figure 13c is the System                                                                              
                 Datalog File Utility Menu, which includes Read Access Allowed                                                                          
                 Log, Read Access Denied Log, Read Boot-Up Log, and Return to                                                                           

                          2Appellants did not file a reply brief addressing this                                                                        
                 change or any of the other changes in the examiner's                                                                                   
                 explanation of the rejection.                                                                                                          
                                                                       - 8 -                                                                            





Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  Next 

Last modified: November 3, 2007